Research article

Group key agreement protocol for edge computing in industrial internet

  • Received: 30 March 2022 Revised: 07 August 2022 Accepted: 22 August 2022 Published: 31 August 2022
  • Industrial internet security is a critical component of cyberspace safety. Furthermore, the encryption protocol is a critical component of cyberspace security. Due to the rapid development of industrial internet and edge computing, increasingly more devices are outsourcing their data to cloud servers to save costs. Edge devices should have a secure session key to reduce communication costs and share information. However, most key generation and storage are completed by a centralized third-party organization, which carries some security risks. In this context, this paper will propose a lightweight multi-dimensional virtual iteration of the group key agreement protocol. Group key agreement protocol allows for one-at-a-time encryption and timely key updates without the involvement of a trusted third party, and each device in the network can agreement a large number of keys. According to the analysis of this protocol, it has high security, rapid computation speed, and little storage space.

    Citation: Yifeng Yin, Zhaobo Wang, Wanyi Zhou, Yong Gan, Yanhua Zhang. Group key agreement protocol for edge computing in industrial internet[J]. Mathematical Biosciences and Engineering, 2022, 19(12): 12730-12743. doi: 10.3934/mbe.2022594

    Related Papers:

    [1] Yanrong Lu, Dawei Zhao . An anonymous SIP authenticated key agreement protocol based on elliptic curve cryptography. Mathematical Biosciences and Engineering, 2022, 19(1): 66-85. doi: 10.3934/mbe.2022003
    [2] Sabina Szymoniak . Security protocols analysis including various time parameters. Mathematical Biosciences and Engineering, 2021, 18(2): 1136-1153. doi: 10.3934/mbe.2021061
    [3] Xingxing Jia, Yixuan Song, Daoshun Wang, Daxin Nie, Jinzhao Wu . A collaborative secret sharing scheme based on the Chinese Remainder Theorem. Mathematical Biosciences and Engineering, 2019, 16(3): 1280-1299. doi: 10.3934/mbe.2019062
    [4] Jiang Zhao, Dan Wu . The risk assessment on the security of industrial internet infrastructure under intelligent convergence with the case of G.E.'s intellectual transformation. Mathematical Biosciences and Engineering, 2022, 19(3): 2896-2912. doi: 10.3934/mbe.2022133
    [5] Shufen Niu, Wei Liu, Sen Yan, Qi Liu . Message sharing scheme based on edge computing in IoV. Mathematical Biosciences and Engineering, 2023, 20(12): 20809-20827. doi: 10.3934/mbe.2023921
    [6] Ching-Chun Chang, Chang-Tsun Li . Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems. Mathematical Biosciences and Engineering, 2019, 16(5): 3367-3381. doi: 10.3934/mbe.2019168
    [7] Delong Cui, Hong Huang, Zhiping Peng, Qirui Li, Jieguang He, Jinbo Qiu, Xinlong Luo, Jiangtao Ou, Chengyuan Fan . Next-generation 5G fusion-based intelligent health-monitoring platform for ethylene cracking furnace tube. Mathematical Biosciences and Engineering, 2022, 19(9): 9168-9199. doi: 10.3934/mbe.2022426
    [8] Yongjun Ren, Yan Leng, Yaping Cheng, Jin Wang . Secure data storage based on blockchain and coding in edge computing. Mathematical Biosciences and Engineering, 2019, 16(4): 1874-1892. doi: 10.3934/mbe.2019091
    [9] Yanxu Zhu, Hong Wen, Jinsong Wu, Runhui Zhao . Online data poisoning attack against edge AI paradigm for IoT-enabled smart city. Mathematical Biosciences and Engineering, 2023, 20(10): 17726-17746. doi: 10.3934/mbe.2023788
    [10] Bin Wang, Fagui Liu . Task arrival based energy efficient optimization in smart-IoT data center. Mathematical Biosciences and Engineering, 2021, 18(3): 2713-2732. doi: 10.3934/mbe.2021138
  • Industrial internet security is a critical component of cyberspace safety. Furthermore, the encryption protocol is a critical component of cyberspace security. Due to the rapid development of industrial internet and edge computing, increasingly more devices are outsourcing their data to cloud servers to save costs. Edge devices should have a secure session key to reduce communication costs and share information. However, most key generation and storage are completed by a centralized third-party organization, which carries some security risks. In this context, this paper will propose a lightweight multi-dimensional virtual iteration of the group key agreement protocol. Group key agreement protocol allows for one-at-a-time encryption and timely key updates without the involvement of a trusted third party, and each device in the network can agreement a large number of keys. According to the analysis of this protocol, it has high security, rapid computation speed, and little storage space.



    With the rise of the Industrial Internet concept, intelligent transformation is happening in the industrial field. In the actual industrial scenario, numbers of devices will generate large industrial data sets [1,2,3]. The traditional cloud computing data model uses centralized processing, and massive amounts of data rely on remote cloud computing centers for computation and storage, putting tremendous pressure on the industrial Internet architecture based on the cloud computing model [4,5]. In addition, unscrupulous elements can easily steal data during long-distance transmission, so it cannot guarantee data of security. Compared with cloud computing, edge computing can store and share resources near mobile devices, providing users with low latency and high bandwidth access to information and computing resources [6,7].

    In the edge computing architecture of the Industrial Internet, the cloud server is a trusted root that connects edge servers. An edge server is a domain administrator responsible for storing common data from edge devices and transferring complex data to the cloud server [8,9]. Edge devices collect data and then upload it to a local edge server. Edge devices can share information. These edge servers in the edge computing layer are effective solutions for enhancing cloud computing capabilities [10,11].

    To reduce the communication consumption of edge devices and ensure the security of resource sharing among edge devices, only users of the group with the same key can decrypt this information. Edge devices in a group can negotiate a shared key and use the shared key to encrypt the data of members in the group. Most of the existing schemes are to store and manage the encryption and decryption keys of the data directly by a third-party authority (e.g., certificate authorities) [12,13,14,15,16,17]. Then we have to trust the third-party organization that the key management is safe and secure. This management scheme can threaten the entire system's security once the central institution is attacked. As a result, the research on reliable and secure group key protocols is still ongoing [18,19].

    Naresh [20] proposed a cluster-based hybrid layered group key protocol, which supports mutual authentication among group members, but consumes a lot of communication costs and is difficult to guarantee forward and backward confidentiality. Braeken [21] proposed a public asymmetric group key protocol for unpaired authentication, which does not require the participation of the certificate authority, but consumes a lot of communication. Chen et al. [22] proposed a broadcast encryption scheme based on anonymous certificates. In combination with broadcast encryption, it uses a shared key to transmit messages. But the scheme uses bilinear pair operation, which makes it computationally more expensive. Literature [23] proposed a group key protocol supporting anonymity, which can ensure user privacy security in the cloud environment. Literature [24,25] proposed the use of an elliptic curve cryptography (ECC) to establish secure session keys between authorized users and devices. Edge devices cannot support ECC because of their limited computation and storage capabilities. Literature [26] proposed a key management scheme based on the permutation algorithm, which can effectively improve the computational efficiency compared to the public key encryption scheme. The scheme is based on polymorphic cryptography and has high-security performance. Lu et al. [27] proposed an anonymous authentication group key protocol based on an ECC with complete forward and backward confidentiality and higher security performance. Wang et al. [28] proposed polynomial public key encryption, which can effectively resist key disclosure attacks.

    Research shows that numerous group key protocols use asymmetric encryption algorithms, such as elliptical curve cryptography, bilinear pair encryption, polynomial encryption, etc. These public key encryption cryptosystems have a high computational and storage cost, making them unsuitable for encrypting a significant amount of data. Therefore, this paper will propose a lightweight multi-dimensional virtual iteration of the group key agreement protocol, which can effectively solve the shortcomings of the public key encryption cryptosystem.

    The research contributions of this paper are as follows:

    (1) We adopt group key agreement technology to construct an information sharing platform among edge devices. The scheme adopts hashing, multi-dimensional virtual iteration, and symmetric cryptography, which is suitable for edge devices with limited resources.

    (2) Decentralization, with no trusted third parties. This scheme does not need certificate authority to generate and store keys and has higher security.

    (3) Lightweight computing. This scheme adopts a symmetric encryption algorithm, key generation is faster and more efficient and has low computational complexity, so it is suitable for massive amounts of data encryption. This scheme can satisfy the lightweight computing of edge devices.

    (4) Safety evaluation. The multi-dimensional virtual iterative function VI() proposed in this protocol is self-compiFled, and an attacker will face multi-dimensional variation if it is cracked forcibly. Through the theoretical and performance analysis of the protocol, it is proved that the proposed scheme has the characteristics of an anti-eavesdropping attack and anti-man-in-the-middle attack, and has fast running speed, small storage space, low computational complexity, and high security performance.

    Data collection is the foundation of edge computing. In Industrial Internet, edge devices collect data, then control network for monitoring, and finally stored in the cloud center for unified processing. In cloud storage services, users of edge devices lose direct control of their data and prevent servers from maliciously stealing information, users encrypt data and then upload it to the cloud center, where the data stored in the cloud center is ciphertext information.

    The current industrial Internet data storage model uses a centralized key distribution mechanism. And the key is generated and stored by a trusted third-party authority, which is usually a certificate authority (CA). As shown in Figure 1, the model contains three entities: Edge Device, Cloud and User. An Edge Device with limited resources will choose a trusted certification authority to host the key and then get the key from the authority when sharing the data, as shown in steps 1–8.

    Figure 1.  The Centralized key distribution model for the industrial internet.

    The data model with a centralized key distribution mechanism is vulnerable to threats. If someone maliciously attacks the certificate authority, the encrypted and decrypted session keys will also become insecure, resulting in data privacy leakage.

    In order to ensure the security of data shared by edge devices, a group key agreement protocol based on multi-dimensional virtual iteration is proposed, as shown in Figure 2.

    Figure 2.  Group key agreement protocol model based on multi-dimensional virtual iteration.

    Cloud: The cloud computing center provides relevant services to edge devices with storage space and computing resources. The edge devices get the required services through the network according to their needs.

    Edge Server: Store data commonly used by edge devices and provide relevant services to edge devices on time.

    Edge Devices: Edge devices implement the generation and processing of source data. Edge Devices can establish secure communication channels and negotiate session keys for securing data transmission between devices. Provide the required services to devices.

    After edge devices obtains the transmitted information from the database, the server completes and exits the key agreement. The edge devices store and manage the information. When the key agreement ends or before the next key agreement starts, the server is asked to update the data to be sent again. The server works only in the current step and does not participate in subsequent key agreements, nor can it get key information and the plaintext and ciphertext transmitted.

    During the group key agreement, each group of users can uniquely determine the key array on a single dimension. After m devices interact with their respective key arrays Ki[n] through the token ring, the self-compiling of the function is triggered and a multi-dimensional virtual iteration space is constructed. The multi-dimensional virtual iteration space contains m×n security subsystems and is uniformly distributed. The group users permute and iterate over a number of security subsystems to get encryption keys. Repeatedly performing the permutation step, users get a lot of different secure encryption methods.

    When the number of users is large enough, it is impossible to achieve a one-to-one correspondence between the number of security subsystems and the number of subspaces. So a Sha-256 cryptographic hash function needs to be defined to achieve a one-to-many mapping relationship between the number of subspaces and the security subsystems. The arbitrary length of the input, after a hash function encryption processing, can output the fixed-length information, make it uniformly distribute the fixed security subsystem to more than one way, then the multi-dimensional permutation space is a virtual fully populated state. From the user's point of view, it is a fully populated state. If this protocol wants to implement a group key agreement, it must meet the following conditions.

    (1) Multi-party devices have the same multi-dimensional virtual iteration space Smn, m×n security subsystems.

    mn(S11S1nSm1Smn) (1)

    (2) The device Di holds the private key ki and the private key array k,i, which cannot be used directly. The private key and the private key array need to be processed by a function to form the key control array Ki[n], VIF() which is used to construct a multi-dimensional iterative function.

    (3) The devices have the same multi-dimensional virtual iteration function VIF(). It generates a unique and shared multi-dimensional virtual permutation space for the m devices.

    (4) The multi-dimensional virtual iterative function VIF() is self-compiling. If an attacker forces a hack on the function, he will face a multi-dimensional variant of the function.

    Table 1 lists the basic symbols used in this article and their definitions.

    Table 1.  Notations and descriptions.
    Symbol Description
    ki the private key of device i
    k,i the private key array of device i
    uri the network upload speed intercepted by device i
    dri the network download speed intercepted by device i
    uti the total number of network packet upload intercepted by device i
    dti the total number of network packet download intercepted by device i
    Smn m×n security subsystems shared by devices
    Rand() pseudo-random function
    Ki[n] key control array
    Token token ring
    H() hash function of Sha256 encryption algorithm
    VIF(x,y) virtual iterating function with arguments x and y
    IVIF(i) virtual iterator function without the i-th device
    ϕi the i-th security subsystem generated by the devices
    IFSx iterating function system x times

     | Show Table
    DownLoad: CSV

    This model comprises four users, where X-axis, Y-axis, Z-axis and color axis are the four-dimensional concrete coordinate axes. Four users provide a single-dimensional key control sequence to control a single-dimensional coordinate axis in the four-dimensional virtual permutation space. Achieving a distribution of four users that collaboratively control the safety subsystem and are in the model space. At last, x security subsystems are determined in the four-dimensional virtual iterative model space constructed by the function coordinates provided by the four users, as shown in Figure 3.

    Figure 3.  Four-dimensional virtual iterative model space.

    In this protocol, the initial key array Ki[1],Ki[2],,Ki[n] held by device Di is used as the i-th coordinate parameter. Each dimension represents a key array controlled by the device, where the color axis represents the fourth dimension. Assuming that the number of keys in each key array is 4, there are 44=256 security subsystems in the key space constructed by four devices. When the devices determines a set of coordinates, the probability of replacing a security subsystem immediately is 1256.

    Due to the permutation network contains 4n candidate security subsystems, the function of the key array Ki[1],Ki[2],,Ki[n] is to realize the polymorphism overloading principle in the virtual function. The key array arguments determine the security subsystem to be called and executed with equal probability, and finally, make the permutation network obtain a unique internal permutation array.

    As shown in Figure 4, the steps of multi-dimensional virtual iterative group key agreement are as follows:

    Figure 4.  Four-dimensional virtual iterative protocol.

    (1) Initialization step: Device Di holds the private key ki, uri represents the network upload speed intercepted by device Di, dri represents the network download speed intercepted by device Di, uti represents the total number of network packet upload intercepted by device Di, and dti represents the total number of network packet download intercepted by device Di. At this point, device Di converts the contained information into binary form and stores it in mi=(uri||dri||uti||dti). Each user also includes a unique virtual iterator function VIF(). At the same time, Each device monitors the token ring and waits for the key protocol.

    (2) Preparation step: Each device Di uses the pseudo-random function Rand() to pseudo-randomly generate the existing key sequence k,i=[ki1,ki2,,kin,] from the existing mi, the group user Di takes the private key ki and the private key array k,i, device Di uses the private key ki and the hashed private key array k,i XOR to generate the real key array Ki[n], as shown in Eq (2). The user waits for instructions from the token ring in sequence.

    Ki[n]=nn=1(kiH(k,i[n])) (2)

    Device Di has a key array Ki[n], device Dm has a key array Km[n]. And the system contains m×n security subsystems. When Di get the token, device Di secretly put Ki[n] into VIF() for subsequent virtual iteration space distribution.

    (3) Construction step: The device starts a data sharing request, first obtains the token ring, uploads its own key array Ki[n] to the multi-dimensional virtual iteration function IVIF(i), and upon successful upload gets an incomplete virtual iteration function VIF() except for the missing own key array only, as shown in Eq (3).

    IVIF(i)=VIF(Ki[n],,Ki1[n],0,Ki+1[n],,Km[n]) (3)

    After that, the device substitutes the key array Ki[n] held by itself into IVIF(i) to obtain the complete multi-dimensional virtual iteration function VIF(). The multi-dimensional virtual iteration function triggers the self-compilation function and maps onto a multi-dimensional permutation network, which contains m×n secure subsystems in the system. This space is a filled state, and m devices share this key space. K denotes the shared multi-dimensional permutation network, as show in Eq (4).

    K=VIF(K1[n],,Ki1[n],Ki[n],Ki+1[n],,Km[n]) (4)

    (4) Iterative step

    Step 1: In the four-dimensional permutation network, the i-th coordinate selected by the four devices is a security subsystem in the permutation network, represented as ϕi. Each user randomly selects x initial keys. Then rapidly iterate x security subsystems, denoted as ϕ1,ϕ2,,ϕx in order.

    Step 2: Generate an iterative function system IFSx is generated by iterating x security subsystems obtained in Step 1 in a certain order through the self-compiler. Here, x is denoted as Eq (4), as shown in Eq (5).

    SKIFS4=(ϕ4(ϕ3(ϕ2(ϕ1)))) (5)

    At last, the result of iteration can be used as the unique secure encryption key SK to provide the key array of a long period for various symmetric encryption algorithms to complete the key negotiation. Members encrypt their own information about the session key SK and send it to other users. Since the session key SK is unique, all members can decrypt the cipher text to get the information transmitted by other users.

    Step 3: When each member negotiates the key again, cyclic Steps 1 and 2 can quickly replace the corresponding virtual iteration function only to generate a large number of secure keys.

    (1) Resist playback attack: According to the description of this protocol, the virtual iteration function needs to be updated every time multiple users share information. If an attacker steals the n-th shared key, the replay of the n-th key during the (n + 1)-th information sharing fails. At this point, the virtual iteration function has changed, and the attacker will not steal the information interaction of the n+1, so it can resist replay attacks.

    (2) Resist eavesdropping attack: Each user's key array can only control one dimension of the virtual iteration function, so eavesdropping on a single or multiple users cannot get a complete virtual iteration function; Similarly, the coordinate of the iteration function is determined by each user, so the eavesdropper can't get the correct virtual iteration function. Therefore, it can resist eavesdropping attacks.

    (3) Decentralization: This protocol does not require any third-party organization. Each device negotiates the key together and stores its information data independently. Even if a device is compromised by an attacker resulting in data leakage, the attacker cannot analyze the shared keys from the information obtained. Then it is not possible to get the information of others, so it will not affect the next data share of the device.

    (4) Prevent man-in-the-middle attack: During the period of information sharing, an attacker might get {ki,k,i,ki[n]} in the transmission channel, but the virtual iteration function and key space build all need security subsystem Smn, Smn does not exchange information in the transmission channel, and the attacker can obtain safety subsystems, also will not participate in the iteration phase to get the key SK. Even if the attacker gets VIF(k1[n],,ki1[n],0,ki+1[n],,km[n]), because VIF() is self-compiled and unreadable, if the attacker forces VIF(), with each crack, the attacker will end up facing the multidimensional variance function VIF().

    {VIF(1,1,,1,1)(K1[n],,Ki1[n],Ki[n],Ki+1[n],,Km[n])VIF(1,1,,1,2)(K1[n],,Ki1[n],Ki[n],Ki+1[n],,Km[n])VIF(1,1,,1,n)(K1[n],,Ki1[n],Ki[n],Ki+1[n],,Km[n])}{VIF(1,1,,1,1)(K1[n],,Ki1[n],Ki[n],Ki+1[n],,Km[n])VIF(1,1,,2,1)(K1[n],,Ki1[n],Ki[n],Ki+1[n],,Km[n])VIF(1,1,,n,1)(K1[n],,Ki1[n],Ki[n],Ki+1[n],,Km[n])}{VIF(1,1,,1,1)(K1[n],,Ki1[n],Ki[n],Ki+1[n],,Km[n])VIF(2,1,,1,1)(K1[n],,Ki1[n],Ki[n],Ki+1[n],,Km[n])VIF(n,1,,1,1)(K1[n],,Ki1[n],Ki[n],Ki+1[n],,Km[n])} (6)

    (5) Mutual Authentication: In constructing the key space, all users participate in the spaces construction. An attacker cant get the key by participating in the token ring as an illegal user. Therefore, the resulting key space is identical and unique. If the key space generated by a user is different from that of another user, the user is invalid. The multi-dimensional virtual permutation mechanism contains the unique permutation network generated by all users' security subsystems with equal probability, which is equivalent to the user's signature information. So it achieves mutual authentication between users.

    Computational complexity and time overhead are the main performance indicators of protocol optimization. This section summarizes several encryption methods with four representative references [18,29,30,31].

    We used the advantage of the Crypto ++Library to measure the elapsed time of the cryptographic operations. The computer used for this test was an Ubuntu 11.10 operating system with an Intel Core Duo 1.86 GHz and 2 gigabytes of RAM. It showed the symbols and data used in the performance analysis in Table 2. Table 3 compares the time cost of the research protocol in this paper with the references and calculates the theoretical test time.

    Table 2.  The symbols and data used in the performance analysis.
    Operations Symbol Times(ms)
    HMAC-SHA-256 Th 0.067
    RAND Trand 0.045
    Modular inversion Tinv 0.124
    Bilinear pairing Tbp 4.514
    Multiplication over elliptic curve Tmul 0.612
    Addition over elliptic curve Tadd 0.125
    Symmetric encryption operation TEk()/Dk() 0.161

     | Show Table
    DownLoad: CSV
    Table 3.  Computational cost comparison.
    Reference Trand Tbp Tmul Tadd Tinv Th TEk()/Dk() sum
    Cheng 2 2n+2 n+3 2n-4 1 4 - 2Trand+(2n+2)Tbp+(n+3)Tmul+(2n4)Tadd+Tinv+4Th
    Vinoth - - 2n - - 10n+9 4n+2 2nTmul+(10n+9)Th+(4n+2)TEK()/DK()
    Islam 3 - 2n+4 2n-1 - 4 - 3Trand+(2n+4)Tmul+(2n1)Tadd+4Th
    Wang 3 n+2 5 - - 2n+6 - 3Trnd+2Tbp+5Tmul+(2n+6)Th
    The proposed 1 - - - - n n 1Trand+nTh+nTEk()/Dk()

     | Show Table
    DownLoad: CSV

    Cheng et al. [29] proposed an authentication group key protocol based on Diffie-Hellman. In this protocol, the user's static private key and temporary key are bound to provide bidirectional authentication and resist temporary key leakage attack. However, extensive bilinear pairing, elliptic curve scalar multiplication and elliptic curve scalar addition are adopted. Therefore, the calculation time cost is relatively high.

    Vinoth et al. [18] proposed to use secret sharing technology to construct a group key negotiation. Using only hashing function, XOR, and symmetric cryptography in the scheme can have lower communication overhead. Compared to Cheng, the computational overhead is lower.

    Islam et al. [30] proposed an unpaired authentication group key protocol based on elliptic curve cryptography. It eliminates public key certificates and reduces computing costs. But in practice, a lot of circular curve scalar multiplication and elliptic curve scalar addition operations are still used.

    Wang et al. [31] proposed a group key agreement based on device-to-device. The public key encryption method is used in the protocol, which has high security performance but requires a lot of calculation. Communication is too expensive compared to our protocol.

    Figure 5 simulates the time required for the key agreement of our proposed protocol and other schemes. The number of key agreement users ranges from 1 to 50. With the increase of users, we can conclude that Cheng's scheme takes the longest time, while our scheme consumes less calculation and has better performance.

    Figure 5.  The time required for key agreement of our proposed protocol and other schemes.

    Compared to these protocols, our scheme has a shorter computation time. And has a stronger defense capability. In the construction phase of the multi-dimensional iterative space, with the increase of the number of devices, although it will relatively increase a small amount of storage overhead, the multi-dimensional replacement space and virtual iteration function constructed in the negotiation phase to achieve "one key at a time", close to the random state, can ensure the security problem. In addition, this protocol uses a symmetric encryption algorithm, which can quickly iterate through a large number of keys and encrypt data, greatly reducing the time overhead.

    In building industrial internet, it is necessary to pay attention to the security of shared keys of edge devices. Compared with the previous centralized key protocol, this protocol can better protect security and reduce data transmission time without resorting to any third party.

    This paper proposes a multi-dimensional virtual iterative key protocol without certificates. Compared with the asymmetric protocol in references [18,29,30,31], it features short computation time, small storage space, and large encrypted plaintext data, which can quickly replace a large number of secure keys. Meanwhile, the multi-dimensional virtual iterative key space proposed by this protocol has good security against man-in-the-middle attacks and replay attacks. In the edge environment of industrial Internet, there are problems of large data volume and low security. This protocol has good practicality and application space for such platforms, also does not need to bear a large amount of computational consumption.

    As the number of participating users increases, the storage cost will increase accordingly. Reducing storage consumption and increasing user identity authentication will also be the focus of future research.

    This paper is supported by the Natural Science Foundation of Henan Province of China (Grant No.202300410508), the Natural Science Foundation of Henan Province (Grant No.222300420371), the Key Research Project of Higher Education of Henan Province (Grant No. 22A520047), the National Natural Science Foundation of China under Grant U1804263, and key foundation of Science and Technology Development of Henan Province No.142102210081.

    The authors declare that there are no conflicts of interest.



    [1] D. Wang, An enterprise data pathway to industry 4.0, IEEE Eng. Manag. Rev., 46 (2018), 46–48. https://doi.org/10.1109/EMR.2018.2866157 doi: 10.1109/EMR.2018.2866157
    [2] Z. Cai, X. Zheng, A private and efficient mechanism for data uploading in smart cyber-physical systems, IEEE Trans. Network Sci. Eng., 7 (2020), 766–775. https://doi.org/10.1109/TNSE.2018.2830307 doi: 10.1109/TNSE.2018.2830307
    [3] Y. Huo, C. Meng, R. Li, T. Jing, An overview of privacy preserving schemes for industrial internet of things, China Commun., 17 (2020), 1–18. https://doi.org/10.23919/JCC.2020.10.001 doi: 10.23919/JCC.2020.10.001
    [4] J. Shen, T. Zhou, D. He, Y. Zhang, X. Sun, Y. Xiang, Block design-based key agreement for group data sharing in cloud computing, IEEE Trans. Depend. Secure Comput., 16 (2019), 996–1010. https://doi.org/10.1109/TDSC.2017.2725953 doi: 10.1109/TDSC.2017.2725953
    [5] Z. Zhang, L. Huang, R. Tang, T. Peng, L. Guo, X. Xiang, Industrial blockchain of things: A solution for trustless industrial data sharing and beyond, in 2020 IEEE 16th International Conference on Automation Science and Engineering (CASE), (2020), 1187–1192. https://doi.org/10.1109/CASE48305.2020.9216817
    [6] C. Pham, D. T. Nguyen, Y. Njah, N. H. Tran, K. K. Nguyen, M. Cheriet, Share-to-run iot services in edge cloud computing, IEEE Int. Things J., 9 (2022), 497–509. https://doi.org/10.1109/JIOT.2021.3085777 doi: 10.1109/JIOT.2021.3085777
    [7] T. Qiu, J. Chi, X. Zhou, Z. Ning, M. Atiquzzaman, D. O. Wu, Edge computing in industrial internet of things: Architecture, advances and challenges, IEEE Commun. Surv. Tut., 22 (2020), 2462–2488. https://doi.org/10.1109/COMST.2020.3009103 doi: 10.1109/COMST.2020.3009103
    [8] F. Saeik, M. Avgeris, D. Spatharakis, N. Santi, D. Dechouniotis, J. Violos, et al., Task offloading in edge and cloud computing: A survey on mathematical, artificial intelligence and control theory solutions, Comput. Networks, 195 (2021), 108177. https://www.sciencedirect.com/science/article/pii/S1389128621002322
    [9] K. Fan, Q. Pan, J. Wang, T. Liu, H. Li, Y. Yang, Cross-domain based data sharing scheme in cooperative edge computing, in 2018 IEEE International Conference on Edge Computing (EDGE), (2018), 87–92. https://doi.org/10.1109/EDGE.2018.00019
    [10] X. Jia, D. He, N. Kumar, K. K. R. Choo, A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing, IEEE Syst. J., 14 (2020), 560–571. https://doi.org/10.1109/JSYST.2019.2896064 doi: 10.1109/JSYST.2019.2896064
    [11] X. Wang, Z. Zhou, P. Han, T. Meng, G. Sun, J. Zhai, Edge-stream: A stream processing approach for distributed applications on a hierarchical edge-computing system, in 2020 IEEE/ACM Symposium on Edge Computing (SEC), (2020), 14–27. https://doi.org/10.1109/SEC50012.2020.00009
    [12] E. Abirami, T. Padmavathy, Proficient key management scheme for multicast groups using group key agreement and broadcast encryption, in 2017 International Conference on Information Communication and Embedded Systems (ICICES), (2017), 1–5. https://doi.org/10.1109/ICICES.2017.8070789
    [13] R. Sharma, S. Kumar, M. C. Trivedi, Mobile cloud computing: A needed shift from cloud to mobile cloud, in 2013 5th International Conference and Computational Intelligence and Communication Networks, (2013), 536–539. https://doi.org/10.1109/CICN.2013.116
    [14] M. Anisetti, C. A. Ardagna, E. Damiani, F. Gaudenzi, A semi-automatic and trustworthy scheme for continuous cloud service certification, IEEE Trans. Serv. Comput., 13 (2020), 30–43. https://doi.org/10.1109/TSC.2017.2657505 doi: 10.1109/TSC.2017.2657505
    [15] Y. Wang, W. Zhang, X. Wang, M. K. Khan, P. Fan, Efficient privacy-preserving authentication scheme with fine-grained error location for cloud-based vanet, IEEE Trans. Veh. Technol., 70 (2021), 10436–10449. https://doi.org/10.1109/TVT.2021.3107524 doi: 10.1109/TVT.2021.3107524
    [16] K. Yu, Z. Guo, Y. Shen, W. Wang, J. C.W. Lin, T. Sato, Secure artificial intelligence of things for implicit group recommendations, IEEE Int. Things J., 9 (2022), 2698–2707. https://doi.org/10.1109/JIOT.2021.3079574 doi: 10.1109/JIOT.2021.3079574
    [17] L. Tan, K. Yu, F. Ming, X. Cheng, G. Srivastava, Secure and resilient artificial intelligence of things: A honeynet approach for threat detection and situational awareness, IEEE Consum. Electr. Mag., 11 (2022), 69–78. https://doi.org/10.1109/MCE.2021.3081874 doi: 10.1109/MCE.2021.3081874
    [18] R. Vinoth, L. J. Deborah, P. Vijayakumar, N. Kumar, Secure multifactor authenticated key agreement scheme for industrial iot, IEEE Int. Things J., 8 (2021), 3801–3811. https://doi.org/10.1109/JIOT.2020.3024703 doi: 10.1109/JIOT.2020.3024703
    [19] Q. Zhang, L. Zhu, R. Wang, J. Li, J. Yuan, T. Liang, et al., Group key agreement protocol among terminals of the intelligent information system for mobile edge computing, Int. J. Intell. Syst., (2021). https:/doi.org/10.1002/int.22544 doi: 10.1002/int.22544
    [20] V. S. Naresh, S. Reddi, N. V. E. S. Murthy, A provably secure cluster-based hybrid hierarchical group key agreement for large wireless ad hoc networks, Human-centric Comput. Inform. Sci., 9 (2019), 26. https://doi.org/10.1186/s13673-019-0186-5 doi: 10.1186/s13673-019-0186-5
    [21] A. Braeken, Pairing free certified common asymmetric group key agreement protocol for data sharing among users with different access rights, Wireless Pers. Commun., 121 (2021). 307–318, https://doi.org/10.1007/s11277-021-08636-4 doi: 10.1007/s11277-021-08636-4
    [22] L. Chen, J. Li, Y. Zhang, Anonymous certificate-based broadcast encryption with personalized messages, IEEE Trans. Broadcast., 66 (2020), 867–881. https://doi.org/10.1109/TBC.2020.2984974 doi: 10.1109/TBC.2020.2984974
    [23] K. Yu, L. Tan, C. Yang, K. K. R. Choo, A. K. Bashir, J. J. P. C. Rodrigues, et al., A blockchain-based shamir¡¯s threshold cryptography scheme for data protection in industrial internet of things settings, IEEE Int. Things J., 9 (2022), 8154–8167. https://doi.org/10.1109/JIOT.2021.3125190 doi: 10.1109/JIOT.2021.3125190
    [24] X. Li, J. Niu, M. Z. A. Bhuiyan, F. Wu, M. Karuppiah, S. Kumari, A robust ecc-based provable secure authentication protocol with privacy preserving for industrial internet of things, IEEE Trans. Indust. Inform., 14 (2018), 3599–3609. https://doi.org/10.1109/TII.2017.2773666 doi: 10.1109/TII.2017.2773666
    [25] J. Shen, S. Chang, J. Shen, Q. Liu, X. Sun, A lightweight multi-layer authentication protocol for wireless body area networks, Future Gener. Comput. Syst., 78 (2018). 956–963, https://doi.org/10.1016/j.future.2016.11.033 doi: 10.1016/j.future.2016.11.033
    [26] Y. Yin, K. Liu, C. Hu, Y. Gan, The group key agreement protocol based on multi-dimensional virtual permutation, IEEE Commun. Letters, 24 (2020), 2728–2732. https://doi.org/10.1109/LCOMM.2020.3017660 doi: 10.1109/LCOMM.2020.3017660
    [27] Y. Lu, D. Zhao, An anonymous sip authenticated key agreement protocol based on elliptic curve cryptography, Math. Biosci. Eng., 19 (2022), 66–85. https://doi.org/10.3934/mbe.2022003 doi: 10.3934/mbe.2022003
    [28] X. Wang, B. Yang, An improved signature model of multivariate polynomial public key cryptosystem against key recovery attack, Math. Biosci. Eng., 16 (2019), 7734–7750. https://doi.org/10.3934/mbe.2019388 doi: 10.3934/mbe.2019388
    [29] Q. Cheng, C. Ma, F. Wei, Analysis and improvement of a new authenticated group key agreement in a mobile environment, Ann. Telecommun., 66 (2011), 331–337., https://doi.org/10.1007/s12243-010-0213-z doi: 10.1007/s12243-010-0213-z
    [30] R. Vinoth, L. J. Deborah, P. Vijayakumar, N. Kumar, Secure multifactor authenticated key agreement scheme for industrial iot, IEEE Int. Things J., 8 (2021), 3801–3811. https://doi.org/10.1109/JIOT.2020.3024703 doi: 10.1109/JIOT.2020.3024703
    [31] S. K. H. Islam, G. P. Biswas, A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks, Ann. Telecommun., 67 (2012), 547–558. https://doi.org/10.1007/s12243-010-0213-z doi: 10.1007/s12243-010-0213-z
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2217) PDF downloads(81) Cited by(0)

Figures and Tables

Figures(5)  /  Tables(3)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog